Answer To: Assessment Task 2: WAN specification projectTask summaryIn this assessment task, you are required to...
Vinay answered on Jun 24 2021
Task 1
1 “A local area network (LAN) can be a variety of laptops and computer peripherals (disk storage devices, printers) connected by high-speed data centers between buildings or adjacent buildings. Because LAN originated as ways of interconnecting multiple devices between a companies, which can enable the native process, while giving access to different applications connected to the transmission of messages between network networks, while not using a laptop host central access to various file stores.
.
· Small LAN One is to circulate a token or slots round the ring: a station can transmit when, and only when, it holds the token. This is simple and efficient, and should not be thought of as greatly decreasing the capacity of the network, because the token circulates extremely fast.
· Large LAN, the opposite technique is employed by LANs on the local network. local network could be a public specification resulting from preliminary work by Xerox Corporation; the details were printed together by Xerox, digital instrumentality. In Ethernet-type networks, access is controlled by a technique called Carrier Sense Multiple Access with Collision Detection (CSMA / CD).”(Stokes, 1983)
· “A WAN can be an information communication network that operates across the geographic scope of a local area network. WANs face problems with LANs in several ways. While a local network connects computers, peripherals and alternative devices during a single building or other small geographic area, a WAN allows the transmission of knowledge across greater geographical distances. In addition, the associate-level company must purchase a WAN service provider to use the WAN operator's network services. LANs usually measure hand in hand by the company or organization that uses them. WANs use resources provided by a service provider or operator, such as a telephone or cable company, to connect a company's locations to all alternatives, locations of alternative organizations, external services and remote users. WANs offer network capabilities to support the spread of mission-critical traffic, such as voice, video and data.”(Kauffman, 2008)
· “VPN stands for Virtual Private Network: A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only virtually private, however, because this data actually travels over shared public networks, rather than fully dedicated private connections.
a) Remote Access VPNs: Remote Access VPN is also called virtual private dial-up networks (VPDNs).These are use to-LAN connections used when employees of a company who are in remote locations need to connect to the company's private network.
b) Site to Site VPNs: A site-to-site VPN allows offices at multiple fixed locations to establish secure connections with each other over a public network such as the Internet.”(Bhattarai, 2016)
· Intranet-based: “If a company has one or more remote locations that it wants to post on an extremely large remote non-public virtual VPN network, three unique non-public networks will produce an associated grade computer network VPN to connect all separate local networks for a WAN. Extranet-based - once a company incorporates a close relationship with another company (such as a partner, provider or customer), it will create an associated-grade extranet VPN that connects these companies' LANs. This extranet VPN allows companies to appear in an extremely secure shared network configuration and prevent access to separate intranet.”(Bhattarai, 2016)
· Virtual LANs (VLANs) “Allows an extended computer network to be partitioned into many ostensibly separate LANs. every network of virtual computers receives an AN identifier (sometimes called a color) and packets travel only from one section to another if each segment has an equivalent identifier. This has the impact of limiting the number of segments on an extended computer network that can receive any broadcast packet. a nice feature of VLANs is that you can change the network topology without moving any wires or changing all addresses.”(Bhattarai, 2016)
2. “The electronic equipment connects to a cable / wire of the skin, transferring information from the network (email, You Tube videos, Google search results, files) from anywhere on the planet. a single wire that goes from your electronic equipment to your PC delivers your requests and net activities to your PC and monitor. just in case of questions, you cannot simply connect this cable from your network service provider directly to your PC.”
3. WLAN: “Wireless technology helped simplify the network, allowing multiple computer users to share resources simultaneously in a home or business without additional or intrusive cabling. These features can include a broadband Internet connection, network printers, data files and even streaming audio and video.”(U.S Robtics Corporate Author, 2014)
4. “The basics of IP address works to create an IP addressing plan for your network. This guide is a concise reference on IP addressing best practices, including
The basic concepts of IP addressing
· The IP addressing plan used in the Cisco Smart Business Architecture (SBA) Foundation lab network
· Guidance on how to add new services to an existing network
· Assistance planning for the acquisition of a company that has a different IP address space
· A plan for expansion after running out of IP address space
· An IP address migration path for growth
· An IP addressing plan that can be used in midsize networks as a template for customer deployments.”(Cisco Systems, 2011)
“A router does two special things by leeching on to your modem. It can take the digital signal from your modem (which the modem gets from the cable company's cable) and share it with (route it to) other computers in the house. You now have a computer network at home. In order to do this, the router monkeys with and modifies the IP address on your computer(s). Just by doing that, it automatically makes it hard for hackers to now get at your computer. In fact, it's harder to target any specific computer linked to the router. A wireless router allows you to connect your Internet connection at home with any wireless device, such as a laptop, Smartphone or iPad.”
5. “Packet-switched networks may establish routes through the switches for particular end-to end connections. These routes are called virtual circuits (VC). A VC is a logical circuit created within a shared network between two network device WAN users does not use the fixed bandwidth available on dedicated, switched or permanent circuits, because the data flow fluctuates. Communications providers have data networks available to serve these users. In packet-switched networks, data is transmitted in frames, cells or labeled packets. Communication links switched by Frame Relay, ATM, X.25 and Metro Ethernet packets”(Kauffman, 2008)
6. “A router does two special things using the modem. It can take the digital signal from the modem (which the modem receives from the cable from the cable company) and share it with (forward to) other computers in the house. You now have a computer network at home. To do this, the router monitors and modifies the IP address on your computer; doing so automatically makes it more difficult for hackers to reach your computer. In fact, it is more difficult to target any specific computer linked to the router. A wireless router allows you to connect your Internet connection at home with any wireless device, such as a laptop, smartphone or iPad.”
7. Three types of modems
· Directional capacity: (half duplex modem and full duplex modem.)
An electronic device allows transmission in one direction at a time. If a carrier is detected on the road by electronic equipment, I offer a signal from the incoming carrier to DTE through an oscillation signal from its digital interface. A full duplex electronic device allows synchronous transmission in each direction. Therefore, there are area 2 units on the road, one at the exit and one at the entrance, wired and wireless modems
· Connection to the line:
2-wire electronic equipment 2-wire modems use an equivalent wire attempt for outgoing and incoming operators. A chartered 2-wire connection is generally cheaper than a 4-wire association, as only 1 attempt of wires is extended to the subscriber's premises; the information association established in the workplace is also a 2-wire association”
· Transmission mode: asynchronous modem and synchronous modem:
Signed modems can handle data bytes with start and stop bits. There is no separate signal or time clock between modem and DTE. Synchronous modems can handle a continuous stream of data bits, but it requires a clock signal. The data bits are always synchronized with the clock signal. There are separate clocks for the data bits being transmitted and received. For synchronized transmission of data bits, the DTE can use its internal clock and provide it to the modem.
8. Routed Protocols Working: The transportation of data across a network is the responsibility of the routed protocols, and In other words, protocols that transfer data packets from one host to another across router(s) are routed protocols.
9. Routing protocols working: “Routing protocols permit routers to appropriately direct data from one place to another. When a node wants to transmit real time applications (video or voice) over IP then it must have to pass through a router. For transmission of real time applications, real time transport protocol (RTP) is used and the session is established between two remote stations through session initiation protocol (SIP) or H.323. Except, these real time transmission protocols, some routing protocols are also used which route the real time applications to its destination. These are: RIP, OSPF, IGRP and EIGRP”(IKram Ud Din Saeed Mahfooz & Muhammad Adnan, 2010)
10. “The TCP/IP (transmission control convention/Internet convention) suite of protocols is the situated of conventions used to impart over the web. It is additionally broadly utilized on numerous authoritative systems because of its adaptability and wide show of usefulness gave. Microsoft who had initially built up their own particular arrangement of conventions now is the entire more broadly utilizing TCP/IP, at first for transport and now to...